ACM Transactions on Internet of Things最新文献

筛选
英文 中文
A Comprehensive Performance Comparison of IEEE 802.15.4 DSME and TSCH in a Realistic IoT Scenario for Industrial Applications IEEE 802.15.4 DSME和TSCH在工业应用物联网场景中的综合性能比较
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2023-05-01 DOI: 10.1145/3595188
Ivonne Andrea Mantilla Gonzalez, Florian Meyer, V. Turau
{"title":"A Comprehensive Performance Comparison of IEEE 802.15.4 DSME and TSCH in a Realistic IoT Scenario for Industrial Applications","authors":"Ivonne Andrea Mantilla Gonzalez, Florian Meyer, V. Turau","doi":"10.1145/3595188","DOIUrl":"https://doi.org/10.1145/3595188","url":null,"abstract":"In the Industrial Internet of Things (i.e., IIoT), the standardization of open technologies and protocols has achieved seamless data exchange between machines and other physical systems from different manufacturers. At the MAC sublayer, the industry-standard protocols IEEE 802.15.4 Time Slot Channel Hopping (TSCH) and Deterministic and Synchronous Multi-channel Extension (DSME) show promising properties for high adaptability and dynamically changing traffic. However, performance comparison between these MAC protocols rarely has gone beyond a simulation phase. This work presents the results of such a comparison on physically deployed networks using the facilities of the FIT-IoTLab. The evaluation includes fully implementing an IIoT protocol stack based on MQTT in Contiki-NG. It comprises the integration of DSME as part of Contiki-NG’s software stack through OpenDSME, the only publicly available implementation of DSME. Results show that both protocols suit IIoT applications, particularly for data collection. The comparison between TSCH and DSME also includes an evaluation of distributed schedulers for both MAC modes and one autonomous scheduler for TSCH within a UDP protocol stack.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85202341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pi-ViMo: Physiology-inspired Robust Vital Sign Monitoring using mmWave Radars Pi-ViMo:使用毫米波雷达的生理启发的鲁棒生命体征监测
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2023-03-24 DOI: 10.1145/3589347
Bo-yan Zhang, Boyu Jiang, Rong Zheng, Xiaoping Zhang, Jun Yu Li, Q. Xu
{"title":"Pi-ViMo: Physiology-inspired Robust Vital Sign Monitoring using mmWave Radars","authors":"Bo-yan Zhang, Boyu Jiang, Rong Zheng, Xiaoping Zhang, Jun Yu Li, Q. Xu","doi":"10.1145/3589347","DOIUrl":"https://doi.org/10.1145/3589347","url":null,"abstract":"Continuous monitoring of human vital signs using non-contact mmWave radars is attractive due to their ability to penetrate garments and operate under different lighting conditions. Unfortunately, most prior research requires subjects to stay at a fixed distance from radar sensors and to remain still during monitoring. These restrictions limit the applications of radar vital sign monitoring in real life scenarios. In this article, we address these limitations and present Pi-ViMo, a non-contact Physiology-inspired Robust Vital Sign Monitoring system, using mmWave radars. We first derive a multi-scattering point model for the human body, and introduce a coherent combining of multiple scatterings to enhance the quality of estimated chest-wall movements. It enables vital sign estimations of subjects at any location in a radar’s field of view (FoV). We then propose a template matching method to extract human vital signs by adopting physical models of respiration and cardiac activities. The proposed method is capable to separate respiration and heartbeat in the presence of micro-level random body movements (RBM) when a subject is at any location within the field of view of a radar. Experiments in a radar testbed show average respiration rate errors of 6% and heart rate errors of 11.9% for the stationary subjects, and average errors of 13.5% for respiration rate and 13.6% for heart rate for subjects under different RBMs.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89614177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HyEdge: A Cooperative Edge Computing Framework for Provisioning Private and Public Services HyEdge:用于提供私有和公共服务的协作边缘计算框架
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2023-03-13 DOI: 10.1145/3585078
Siyuan Gu, Deke Guo, Guoming Tang, Lailong Luo, Yuchen Sun, Xueshan Luo
{"title":"HyEdge: A Cooperative Edge Computing Framework for Provisioning Private and Public Services","authors":"Siyuan Gu, Deke Guo, Guoming Tang, Lailong Luo, Yuchen Sun, Xueshan Luo","doi":"10.1145/3585078","DOIUrl":"https://doi.org/10.1145/3585078","url":null,"abstract":"With the widespread use of Internet of Things (IoT) devices and the arrival of the 5G era, edge computing has become an attractive paradigm to serve end-users and provide better QoS. Many efforts have been paid to provision some merging public network services at the network edge. We reveal that it is very common that specific users call for private and isolated edge services to preserve data privacy and enable other security intentions. However, it still remains open to fulfill such kind of mixed requests in edge computing. In this article, we propose a cooperative edge computing framework, i.e., HyEdge, to offer both public and private edge services systematically. To fully exploit the benefits of this novel framework, we define the problem of optimal request scheduling over a given placement solution of hybrid edge servers to minimize the response delay. This problem is further modeled as a mixed integer non-linear programming problem (MINLP), which is typically NP-hard. Accordingly, we propose the partition-based optimization method, which can efficiently solve this NP-hard problem via the problem decomposition and the branch and bound strategies. We finally conduct extensive evaluations with a real-world dataset to measure the performance of our method. The results indicate that the proposed method achieves elegant performance with low computation complexity.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76548224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security 基于魔方密码系统的区块链环境下物联网安全认证与会话密钥生成模型
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2023-03-06 DOI: 10.1145/3586578
Ankit Attkan, V. Ranga, Priyanka Ahlawat
{"title":"A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security","authors":"Ankit Attkan, V. Ranga, Priyanka Ahlawat","doi":"10.1145/3586578","DOIUrl":"https://doi.org/10.1145/3586578","url":null,"abstract":"Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration, and its various applications even after having a resource-bound architecture. It is challenging to run any high-end security protocol(s) on Edge devices. These devices are highly vulnerable toward numerous cyber-attacks. IoT network nodes need peer-to-peer security, which is possible if there exists proper mutual authentication among network devices. A secure session key needs to be established among source and destination nodes before sending the sensitive data. To generate these session keys, a strong cryptosystem is required to share parameters securely over a wireless network. In this article, we utilize a Rubik's cube puzzle-based cryptosystem to exchange parameters among peers and generate session key(s). Blockchain technology is incorporated in the proposed model to provide anonymity of token transactions, on the basis of which the network devices exchange services. A session key pool randomizer is used to avoid network probabilistic attacks. Our hybrid model is capable of generating secure session keys that can be used for mutual authentication and reliable data transferring tasks. Cyber-attacks resistance and performance results were verified using standard tools, which gave industry level promising results in terms of efficiency, light weightiness, and practical applications.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73622741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Channel-aware FL Approach for Virtual Machine Placement in 6G Edge Intelligent Ecosystems 6G边缘智能生态系统中虚拟机放置的通道感知FL方法
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2023-02-17 DOI: 10.1145/3584705
Benedetta Picano, R. Fantacci
{"title":"A Channel-aware FL Approach for Virtual Machine Placement in 6G Edge Intelligent Ecosystems","authors":"Benedetta Picano, R. Fantacci","doi":"10.1145/3584705","DOIUrl":"https://doi.org/10.1145/3584705","url":null,"abstract":"This article deals with an artificial intelligence (AI) framework to support Internet-of-everything (IoE) applications over sixth-generation wireless (6G) networks. An integrated IoE-Edge Intelligence ecosystem is designed to effectively face the problems of Virtual Machines (VMs) placement based on their popularity, computation offloading optimization, and system reliability improvement predicting compute nodes faults. The main objective of the article is to increase performance in terms of minimization of worst end-to-end (e2e) delay, percentage of requests in outage, and the enhancement of reliability. The article focuses on the following main issues: (i) proposal of a channel-aware federated learning (FL) approach to forecast the popularity of the VMs required by IoE devices; (ii) use of an AI-based channel conditions forecasting module at the benefits of the FL process; (iii) development of a suitable VMs placement on the basis of their popularity and of an efficient tasks allocation technique based on a modified version of the auction theory (AT) and a proper matching game; (iv) enhancement of the system reliability by an echo-state-network (ESN), located on each computation node and running in the background to predict failures and anticipate tasks migration. Numerical results validate the effectiveness of the proposed strategy for IoE applications over 6G networks.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80955899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IDIoT: Multimodal Framework for Ubiquitous Identification and Assignment of Human-carried Wearable Devices 白痴:人类携带的可穿戴设备的普遍识别和分配的多模态框架
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2023-01-12 DOI: 10.1145/3579832
Adeola Bannis, Shijia Pan, Carlos Ruiz, John Shen, Hae Young Noh, Pei Zhang
{"title":"IDIoT: Multimodal Framework for Ubiquitous Identification and Assignment of Human-carried Wearable Devices","authors":"Adeola Bannis, Shijia Pan, Carlos Ruiz, John Shen, Hae Young Noh, Pei Zhang","doi":"10.1145/3579832","DOIUrl":"https://doi.org/10.1145/3579832","url":null,"abstract":"IoT (Internet of Things) devices, such as network-enabled wearables, are carried by increasingly more people throughout daily life. Information from multiple devices can be aggregated to gain insights into a person’s behavior or status. For example, an elderly care facility could monitor patients for falls by combining fitness bracelet data with video of the entire class. For this aggregated data to be useful to each person, we need a multi-modality association of the devices’ physical ID (i.e., location, the user holding it, visual appearance) with a virtual ID (e.g., IP address/available services). Existing approaches for multi-modality association often require intentional interaction or direct line-of-sight to the device, which is infeasible for a large number of users or when the device is obscured by clothing. We present IDIoT, a calibration-free passive sensing approach that fuses motion sensor information with camera footage of an area to estimate the body location of motion sensors carried by a user. We characterize results across three baselines to highlight how different fusing methodology results better than earlier IMU-vision fusion algorithms. From this characterization, we determine IDIoT is more robust to errors such as missing frames or miscalibration that frequently occur in IMU-vision matching systems.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81888394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
LSR: Energy-Efficient Multi-Modulation Communication for Inhomogeneous Wireless IoT Networks LSR:非同构无线物联网网络的高能效多调制通信
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2023-01-10 DOI: 10.1145/3579366
Roman Trüb, Reto Da Forno, Andreas Biri, J. Beutel, L. Thiele
{"title":"LSR: Energy-Efficient Multi-Modulation Communication for Inhomogeneous Wireless IoT Networks","authors":"Roman Trüb, Reto Da Forno, Andreas Biri, J. Beutel, L. Thiele","doi":"10.1145/3579366","DOIUrl":"https://doi.org/10.1145/3579366","url":null,"abstract":"In many real-world wireless IoT networks, the application dictates the location of the nodes and therefore the link characteristics are inhomogeneous. Furthermore, nodes may in many scenarios only communicate with the Internet-attached gateway via multiple hops. If an energy-efficient short-range modulation scheme is used, nodes that are reachable only via high-path-loss links cannot communicate. Using a more energy-demanding long-range modulation allows connecting more nodes but would be inefficient for nodes that are easily reachable via low-path-loss links. Combining multiple modulations is challenging, as low-power radios usually only support the use of a single modulation at a time. In this article, we present the Long-Short-Range (LSR) protocol which supports low-power multi-hop communication using multiple modulations and is suited for networks with inhomogeneous link characteristics. To reduce the inherent redundancy of long-range modulations, we present a method to determine the connectivity graph of the network during regular data communication without adding significant overhead. In simulations, we show that LSR allows for reducing power consumption significantly for many scenarios when compared to a state-of-the-art multi-hop communication protocol using a single long-range modulation. We demonstrate the applicability of LSR with an implementation on real hardware and a testbed with long-range links.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82699432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Upscaling Fog Computing in Oceans for Underwater Pervasive Data Science Using Low-Cost Micro-Clouds 基于低成本微云的水下普适数据科学的海洋雾计算升级
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-12-08 DOI: 10.1145/3575801
Farooq Dar, M. Liyanage, Marko Radeta, Zhigang Yin, Agustin Zuniga, Sokol Kosta, S. Tarkoma, P. Nurmi, Huber Flores
{"title":"Upscaling Fog Computing in Oceans for Underwater Pervasive Data Science Using Low-Cost Micro-Clouds","authors":"Farooq Dar, M. Liyanage, Marko Radeta, Zhigang Yin, Agustin Zuniga, Sokol Kosta, S. Tarkoma, P. Nurmi, Huber Flores","doi":"10.1145/3575801","DOIUrl":"https://doi.org/10.1145/3575801","url":null,"abstract":"Underwater environments are emerging as a new frontier for data science thanks to an increase in deployments of underwater sensor technology. Challenges in operating computing underwater combined with a lack of high-speed communication technology covering most aquatic areas means that there is a significant delay between the collection and analysis of data. This in turn limits the scale and complexity of the applications that can operate based on these data. In this article, we develop underwater fog computing support using low-cost micro-clouds and demonstrate how they can be used to deliver cost-effective support for data-heavy underwater applications. We develop a proof-of-concept micro-cloud prototype and use it to perform extensive benchmarks that evaluate the suitability of underwater micro-clouds for diverse underwater data science scenarios. We conduct rigorous tests in both controlled and field deployments, using river and sea waters. We also address technical challenges in enabling underwater fogs, evaluating the performance of different communication interfaces and demonstrating how accelerometers can be used to detect the likelihood of communication failures and determine which communication interface to use. Our work offers a cost-effective way to increase the scale and complexity of underwater data science applications, and demonstrates how off-the-shelf devices can be adopted for this purpose.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89231177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Flexible and Modular Architecture for Edge Digital Twin: Implementation and Evaluation 边缘数字孪生的灵活模块化架构:实现与评估
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-12-06 DOI: 10.1145/3573206
Marco Picone, M. Mamei, F. Zambonelli
{"title":"A Flexible and Modular Architecture for Edge Digital Twin: Implementation and Evaluation","authors":"Marco Picone, M. Mamei, F. Zambonelli","doi":"10.1145/3573206","DOIUrl":"https://doi.org/10.1145/3573206","url":null,"abstract":"IoT systems based on Digital Twins (DTs) — virtual copies of physical objects and systems — can be very effective to enable data-driven services and promote better control and decisions, in particular by exploiting distributed approaches where cloud and edge computing cooperate effectively. In this context, digital twins deployed on the edge represents a new strategic element to design a new wave of distributed cyber-physical applications. Existing approaches are generally focused on fragmented and domain-specific monolithic solutions and are mainly associated to model-driven, simulative or descriptive visions. The idea of extending the DTs role to support last-mile digitalization and interoperability through a set of general purpose and well-defined properties and capabilities is still underinvestigated. In this paper, we present the novel Edge Digital Twins (EDT) architectural model and its implementation, enabling the lightweight replication of physical devices providing an efficient digital abstraction layer to support the autonomous and standard collaboration of things and services. We model the core capabilities with respect to the recent definition of the state of the art, present the software architecture and a prototype implementation. Extensive experimental analysis shows the obtained performance in multiple IoT application contexts and compares them with that of state-of-the-art approaches.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79084546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VioLinn: Proximity-aware Edge Placementwith Dynamic and Elastic Resource Provisioning 动态和弹性资源配置的邻近感知边缘放置
IF 2.7
ACM Transactions on Internet of Things Pub Date : 2022-12-05 DOI: 10.1145/3573125
Klervie Toczé, Ali J. Fahs, G. Pierre, S. Nadjm-Tehrani
{"title":"VioLinn: Proximity-aware Edge Placementwith Dynamic and Elastic Resource Provisioning","authors":"Klervie Toczé, Ali J. Fahs, G. Pierre, S. Nadjm-Tehrani","doi":"10.1145/3573125","DOIUrl":"https://doi.org/10.1145/3573125","url":null,"abstract":"Deciding where to handle services and tasks, as well as provisioning an adequate amount of computing resources for this handling, is a main challenge of edge computing systems. Moreover, latency-sensitive services constrain the type and location of edge devices that can provide the needed resources. When available resources are scarce there is a possibility that some resource allocation requests are denied. In this work, we propose the VioLinn system to tackle the joint problems of task placement, service placement, and edge device provisioning. Dealing with latency-sensitive services is achieved through proximity-aware algorithms that ensure the tasks are handled close to the end-user. Moreover, the concept of spare edge device is introduced to handle sudden load variations in time and space without having to continuously overprovision. Several spare device selection algorithms are proposed with different cost/performance tradeoffs. Evaluations are performed both in a Kubernetes-based testbed and using simulations and show the benefit of using spare devices for handling localized load spikes with higher quality of service (QoS) and lower computing resource usage. The study of the different algorithms shows that it is possible to achieve this increase in QoS with different tradeoffs against cost and performance.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83501019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信